<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nh-sr-hsfc-usecases-requirements-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="SR hSFC Usecases">Problem Statement, Use Cases, and Requirements of Hierarchical SFC with Segment Routing</title>
    <seriesInfo name="Internet-Draft" value="draft-nh-sr-hsfc-usecases-requirements-01"/>
    <author initials="K." surname="Ni" fullname="Kangkang Ni" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>nikangkang@chinamobile.com</email>
      </address>
    </author>
    <author initials="H." surname="Huang" fullname="Hongyi Huang" role="editor">
      <organization>Huawei</organization>
      <address>
        <email>hongyi.huang@huawei.com</email>
      </address>
    </author>
    <author initials="Y." surname="Zhang" fullname="Yige Zhang">
      <organization>China Mobile</organization>
      <address>
        <email>zhangyige@chinamobile.com</email>
      </address>
    </author>
    <author initials="J." surname="Ye" fullname="Jiaming Ye" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>yejiaming@chinamobile.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="02"/>
    <area>General</area>
    <workgroup>SPRING</workgroup>
    <keyword>keyword1</keyword>
    <keyword>keyword2</keyword>
    <keyword>keyword3</keyword>
    <abstract>
      <?line 54?>
<t>Hierarchical Service Function Chaining (hSFC) is a network service chaining method that utilizes a hierarchical structure to efficiently organize and manage service function chains, enhancing network performance and scalability. This document primarily describes the use case of hSFC, which is the security resource pool. It outlines the associated problem statement and requirements for the security resource pool. The document aims to assist in identifying candidate solution architectures and solutions.</t>
    </abstract>
  </front>
  <middle>
    <?line 57?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Service Function Chaining (SFC) <xref target="RFC7665"/> is a network service delivery and traffic processing technique that allows for the definition and execution of specific service chain routing policies, ensuring that data flows through a sequence of service functions in a predetermined order as it traverses the network. As network scales have grown, such as the decentralization of service resources and the diversification of tenants and vendors, it is difficult to administrate such a large network. A new network architecture known as Hierarchical Service Function Chaining (hSFC) <xref target="RFC8459"/> has emerged. hSFC enables an organization to decompose large-scale networks into multiple administrative domains. This means that it can provide better network design, simplified control, and support for different functional groups within the network, thereby enhancing overall efficiency and management.</t>
      <t>To enhance network service security and offer a wide range of protective services to users, network operators have centrally constructed numerous security resource pools. Within these pools, various security network devices, such as firewalls, Web Application Firewalls (WAFs), Intrusion Prevention Systems (IPS), and more, are deployed to deliver diverse value-added services (i.e Service Function). According to tenants' business requirements or their geographical location the user traffic is steered into the corresponding security resource pool, after arriving which a series of services in a certain order are provided based on security protection needs, network topology, and resource usage. The packets need to continue the remaining original forwardness when finishing the processes inside the resource pool. As per <xref target="RFC8459"/>, the original path information before entering security resource pool is expected to be stored somewhere, within the packets or in the gateway of resource pools, so that it can be restored later. Therefore, it is suitable to orchestrate with hSFC architecture. hSFC introduces a solution based on NSH (Network Service Header). This approach involves network configurations of each type of traffic and additional NSH header in packet headers, which is complicated and not conducive to expansive. However, in cases where SR (Segment Routing) networks are deployed, it only needs to issue the SR policy to define transmission path and update a new one to alter the path when physical topology or business requirements change. By contrast, the NSH solution may not be the preferred choice.</t>
      <t>This document describes a use case involving the deployment of multiple resource pools by network service provider. Every resource pool is designed to offer tenants a wide range of security protection services. The document also analyzes the challenges and issues associated with this use case, discussing the requirements,  seeking an SR-based hSFC solution.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>hSFC: Hierarchical Service Function Chaining</t>
        <t>NSH: Network Service Header</t>
        <t>PBR: Policy Based Routing</t>
        <t>SR: Segment Routing</t>
        <t>SFC: Service Function Chaining</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>To defend against network attacks, ensure the security of enterprise tenants' business applications against viruses, malware, and other security threats, and meet their customized security protection needs, network operators have established security resource pools in multiple regions. Typically, these security resource pools host various security network devices, including firewalls, Web Application Firewalls (WAF), Intrusion Prevention Systems (IPS), and more, to provide a variety of security-focused value-added services. In practical applications, the first step involves routing user traffic to the appropriate security resource pool based on user location, which typically utilizing SR in the existing Internet environment. Then, customized security protection services are provided to customers according to their specific requirements. For example, some tenants may require the use of a firewall followed by IPS services, while others may need to use IPS first and then utilize firewall services. After traversing through all SFs in a SFC, packets are returned to the gateway (i.e., security resource pool) and continue to be forwarded to devices outside of IDC. This necessitates hierarchical service chains to orchestrate SFs within security resource pool (lower-level sub-domain)and service nodes outside the IDC (upper-level domain) respectively and independently.</t>
      <t>SR is a novel network orchestration technology that guides packet paths by adding Segment Identifiers (Segment Routing) in the packet header. Each Segment Identifier corresponds to a node or service function within the network, creating an ordered path from source to destination, defining the packet's transmission route. SR service chain orchestration offers several advantages, including the flexibility to define and customize service chain paths based on specific application and business requirements, support for dynamic adjustment of service chain paths based on real-time application needs, and the ability to guide packets directly to the desired service functions, reducing unnecessary delays within the service chain. Furthermore, SR enables network administrators to manage service chains without altering the underlying network topology, simplifying network configuration.</t>
      <t>As a result, SR represents a user-friendly service chain orchestration method suitable for complex network environments that need to meet diverse application requirements. Given the complexity of internet architecture, the widespread deployment of SR, and the dynamic updates of security devices within a security resource pool, it is recommended to use SR-based service chaining for traffic steering within the security resource pool. This enables dynamic adjustment of service chains and reduces traffic bypass.</t>
      <section anchor="background">
        <name>Problem Statement</name>
        <t>Due to the growth of network scales and the constraints of the existing orchestration method, security resource pools is facing some challenges of delivering value-added security protection services for different users. This section provides an overview of these challenges.</t>
        <section anchor="dispersion-of-service-resources">
          <name>Dispersion Of Service Resources</name>
          <t>Due to varying geographical locations of different tenants and for the purpose of minimizing latency, facilitating network management, and maintenance, the security resource pool is physically deployed in a distributed manner.</t>
        </section>
        <section anchor="multi-tenant">
          <name>Multi-tenant</name>
          <t>In the existing Internet environment, tenants' network service requirements have become diverse, with different tenants facing various threats and demands. In the security resource pool, On one hand, some tenants may only require basic access control functionality, in which case, tenants would only need firewall services. On the other hand, other tenants may necessitate more complex and comprehensive security services. For instance, certain tenants may require initial use of Web Application Firewall services to isolate potential malicious websites and code, followed by additional security checks using firewall services. Different tenants have different needs, and the security resource pool needs to provide tenant-level customized security protection capabilities. Additionally, the network security device needs to be differentiated between different tenants to provide them with distinct configuration.</t>
        </section>
        <section anchor="multi-vendor">
          <name>Multi-vendor</name>
          <t>In a security resource pool, security network devices are usually provided by different vendors,  they need to be orchestrated by unified external network communication. For example, in the security resource pool, firewalls are provided by Vendor A, and WAF is provided by Vendor B. If a customer subscribes to both firewall and WAF security value-added services, the traffic needs to pass through Vendor A's firewall first and then through Vendor B's WAF device. This implies that Vendor A's firewall needs to be aware of the next hop being Vendor B's WAF device, and there is an expectation for the traffic to flow directly from Vendor A's firewall device to Vendor B's WAF.</t>
        </section>
        <section anchor="dynamic-orchestration">
          <name>Dynamic Orchestration</name>
          <t>In a security resource pool, security network devices may encounter dynamic adjustments. For example, adding new security network devices to the pool may require existing service chains, such as NSH, to undergo state updates across multiple devices. The main issue in this situation is the presence of state (SPI, SI index tables) within the network devices. Therefore, when there are changes in business deployments, all network devices need to undergo state updates. This is unfavorable for flexible and agile deployments. In contrast, SR is friendly as it does not require the presence of specific states in the network.</t>
        </section>
      </section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>[REQ-1] Tenant-level Service Orchestration</t>
      <t>Different tenants have varying security protection needs. specifically, the types and order of security protection they require are differently. Therefore, it is imperative to cater to multiple tenants and support tenant-level service chain orchestration.</t>
      <t>[REQ-2] Tenant Information Carriage</t>
      <t>As the security resource pool needs to meet service chaining at the tenant level, it is essential for the packets to support carrying tenant information.</t>
      <t>[REQ-3] Dynamic Allocation Of Service Resources (Scalability)</t>
      <t>The security resource pool is in a constant state of dynamic adjustment, and with the evolution of business needs, there may be additions or removals of certain security network devices. When there are updates to the security network devices within the resource pool, it is essential to support their dynamic orchestration into the service chain.</t>
      <t>[REQ-4] Independent Resource Pool Orchestration</t>
      <t>Service functions in different security resource pools support different protocols (i.e., some security network devices within certain resource pools do not support SR), and their suitable methods for service chaining may also vary. Achieving unified orchestration is challenging. Therefore, it is necessary for security resource pools to support independent orchestration, without interfering with each other.</t>
      <t>[REQ-5] Reliability Of Service Function</t>
      <t>During service chain orchestration, it is necessary to support the retrieval of device information, including device operational status, identification details, etc. In the event of network equipment issues, bypassing the problematic equipment to avoid traffic disruption should be enabled.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8459">
          <front>
            <title>Hierarchical Service Function Chaining (hSFC)</title>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <date month="September" year="2018"/>
            <abstract>
              <t>Hierarchical Service Function Chaining (hSFC) is a network architecture allowing an organization to decompose a large-scale network into multiple domains of administration.</t>
              <t>The goals of hSFC are to make a large-scale network easier to design, simpler to control, and supportive of independent functional groups within large network operators.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8459"/>
          <seriesInfo name="DOI" value="10.17487/RFC8459"/>
        </reference>
      </references>
    </references>
    <?line 158?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA51a23IbyZF9RwT/oSw9jLgBIERaY48ZXo8pShzSlkguyVmF
dkOxUeguAGU1uuCqboKQYv7F3+Iv25OZVX3BhRo7ZiaG6K5LVl5Onszq0Wh0
MAiVLvP/04UrzYmqfG0OBpmuzMz59YkKVY4R9WRhQ7CuvF8vMejy7f35wcAu
PY8P1fHLl394eXwwKHQ5O1GmPBgcDCpbFRh6492kMAt1V2HJhSmrofo5GHWm
gwlDhY3Vrfl7bT2/C8pN1YU1XvtsbjNdqLvzM7Wy1VzdmRmNULeurmw5Oxjo
ycSbhxN1d6vmNAqrZrTowSB3WakX2Dv3elqNyvko+NE8TLNRHceMfGfP0cuj
g4GbBFeYyoSTg0G9zLX89VzRXyfq+OXx8egl/atGI36mbFBTWxQmV7ZUuq7c
QlckcbFWk7V6XBTHfpopO1Wlq9TMPohStDf6RP1kShyxOBisnP88865e4hg3
t5dXP9GYzyvsrNRIfTZrDMiPer+Oe79+y4vW1dx5mjSil7YMJ+qvY3Vl6Zdo
4q8wzGf8Fx86P9Ol/QKJXXmizua21Oq9m9jC0FvvyHAmt5Xz9NsstC1OVGk/
x1X+nNGMBU8YZ26heltfjNVFrclEafcLV87Wtn3a3x6PV8Y+sfGcp4/nNP3P
cx5Nu/Y2/ThW/zPvbfrRzkz77OkTx42+0Og15j19wL+M1UfTbvQXqxfwyPjs
31Lt2vxNFtncmMx7MCidJ+96MCf0y5bT3u+DwQhOqSeh8jqrDgb9+DH+wWZG
nddlRiJBIm1LEvcFRc0h+bFWpanIFVWIo7M0aGHgWrmq5rpSiLvCfjE0ft7d
AvvWWVV7oyqnzHRqM4uwQhxEVRiO8oUuNQySdpgmeXgrIIEpofyM9kzCLI3n
g5aZrBCwmYZibLUeq/s5BEeg1wwKS28X2lvsmZuQeTuBlNXcKMS7ooAnWKHj
DtUKMs/p0PQaaFB7LKe8Ca722GfpXDFWl5UCyhS2jMvoEFxmEfU5dhI4CwnO
WLQunCgI/eTq93jXSK7tIpDesIUNFWGJzfHcTtekigyLW4YboFPN+mK1V4YV
HkQv8VUYJ19Y2DwnfyMAuywr7/JalP31uaWfv9CrJzyDHePr1x9vz89+/7vf
ff/LL7u9JDcFfNCvWQo4H5meFJQZHAbrQMp5af9eG/EfYKNbterJzRTbyZkw
3zxCXfwLtgpLk1lareeQiB7GfuixICdjrwnQMe1FO0BTWk15l2qOwbM5pA6w
jSEfonU3vC8weENmkwP7PSIQJgasGg+DKFvRqXDCEP0gKmCsTkOrDHglXs8x
TgHKV+VQhRoupkM8ZQZzAuwjJHSlSH4hZuTRpM9AJ28GV6bU5FU0BEkkdx7H
hmTk/pY0XhcVO1AO6S1hAHkLS6AK7WddqfHnqhG860jqcwnJSeZ/DTzER354
9f0f4CNzTEcIYMt8LCkZok8KPl4PFklc6MUtlg6hyUKOWI1JNjILxixwNLvE
487ZoCAEz4IwI4LAwugyiP2hFkQMueADokhNTAWjNgcGNNgZmcculgV0DFNn
jsKhEB4S6uXS+YodlFRrPAVochWogzN1YDoCt+k4xJB+eIO836KYe6AUXzSA
mK07MEihP1YUhfcuzjFb4dXgB81zJA9MuqKDeaQp9meclCxISomzGEwAe+Ql
aUEHJNVIONFLo0MCLHF8AW+oogQe4XxhD2xB2x+ac4f4bKgegLq9Sa2yWZo2
GKbAxxV2xaMPZqJOl7BB9PLz9Eq9+HB6Hg6HDFo10U3QR/NAeIg/79YBkItB
lzd3h2KyhfMGf3mKs2Xh1jgH+xbjUowmAyGL2ox0nuN1o6YXdmy2HPwQQZJl
AACGFJeC7zs1gTTIBqGP9IJk1quZcTOvlxI1hYvnihnIN9gIb8UR4Cm5ODgN
wG5Q9NKVvOdu5eOIU/Jk7b19oGGSxQjbPGCwgykR0DLjKwLMCGXQT4yJXE2Q
DuFOZbtVciI8K43JO45TOSCtm62HMclFkeoAF5Y8ttTZZ1MFnkgKo4CyJSM+
4dsiwoXzdmYphBBbK+1zVuVqbkpFOSDMBcFNSh58jECeLsv00iewF/7cgx6O
v3aTpUa90LAkHGti8LdBoEGJ+7VM5jGPyDyVnGWCoELUkNO4hVlRhA+7wZ/O
Di+IT2bA3pVekz36wYMwcD2ImvCxZPUCszyr07OcCd5DbSvCT5LFAZJNBHcu
hxhfuxAeIdfGdM80rSENjdGv7i7Ui6to3uT9F0bDTQ4jnuolrKCJJJUPrngw
baqDcad2VnstqROnNDSuQknImSp6OfkKgs1G1KQt57wDqUmUFh+EDh+jdMCI
AEFpBSqbsCGOQuhGzPJxCaDHD5QXbgVU8ENakOs5xdahUvDFRp142OaULkyw
jl1ZrMXlaX3Ut9FvsQwzjLWACVzU0OHKEGtgcTASUipFpkYrLMdy6oJCVRwE
w9jLl/N1YGxIEUVOsxtTMqpBcMbXa8lOOlTi3qTHxqALeBlpaGJi3BikB3Km
bO5gUmaCfYrcEmPd0mIxcYo+UQ6Phjmb7Nt3ZapuNzNVBBc48Vvmg1thJalX
wkoyWUNrNjLaLlRK2LZJnQsEFdJpsf4S+Rl0h4ocKwldYouGLnvn0KlIL0kF
Q2SJkNWRsDLatMYYKuxtPtMrxOzd7UjiiAMtmYJV/fy5umf6yMalJzTm5Fey
KRoP656o3YFJr29e356oG3HK1yxE0wcBk8e7rfYIHpMET24KsXvNl3ewQg1s
F+8x1GRQ1GUI6tn7n+/unw3l/+rqmv++fftfP1/evn1Df99dnL571/wxiCPu
Lq5/fvem/audeXb9/v3bqzcyGU9V79Hg2fvTj88k7Ty7vrm/vL46ffdMYLbr
1FqKzgl5MqIOYcDwEQbJ27k78/rs5p//OHqFlPEbpIzjoyNiq/Ljh6Pfv8IP
ClLZjTFBfsIb1gOgodGMXETmMr0EJhOeg9GEOXFmAp7xYPAf/0ua+XSi/jjJ
lkev/hQf0IF7D5POeg9ZZ9tPtiaLEnc82rFNo83e8w1N9+U9/dj7nfTeefjH
H6koVqOjH37800Dqy6aZx1wWaGkI/mdE0Ku21qgq4H6q10y/PKY8ItazWGub
cumWKoZm5QcLgkj8cqELMAoTrUc8vF0ZRaDRVWwzLgzyjtA1xHvlFvYL88Fv
sqAN+ow0jKwM0tKdvYGRcJcOfM64OFf366U0CIeRQ++bPXd0wG8ya1tmRc2s
8Vdz63+ZWiO4UjWlWSQjBktSjaYIRYKjXRx7jM0wXWfcGO3ZUVIa5MZJsfWy
JRupxu8R58iVmZrATbjE3c3hGqbD8xMVTzyjSiaIzSzaCNk+0jfziBqTHl2S
O0Lf8Ev4mSulXLtnVPiG7zQ8vEe6iRnzPHAepXsVBjtk0+/oZp+xOgdLMI8a
xMgMmYQ2aZPyfxzbNLpgFt24Apg2tVuI8K8VrNoIxqqAW3KoyEKJvNMiNFTM
EnsSZer7tUu39j3lsiQ2SSSDxrZLQa37WI1w4y2xZdILYLr2kQ50eTPVZOPh
HtMeskRtgcGwH+uJVPeJ6uFBXDxAIZdvziKtLQ23pahtFzb6l90eU9hk23SK
SPr3uNwL0rMfFYgmLFZPRtKfOOSeQly7dHlHMDozJFMvamSXNDPOosWXUtMX
UvrbEsQMqMpN1bEk/NiQczSxwalGai4+qfkmXJMLj1ltSYTIv4maMpUjok5B
EOnDpTQfLbnGNpXuFT6Rw4PzURGwvUCnspUOJyuBiO9WD3hXRyUj6I7Mi8tY
ar4SoZ56t1BR/2x0itkY5dJTTMUki/ld6HN3whfQa6iw31vsa49JKoEvd3Gg
pQeEHZhRD3YZwgqghjSlO9UCe2oCio2NouqbMjyFfgceef7O8mDY71KtS72g
qfnfsFki7k9uB60Wo8ouTG+/mPFSG1K3B2K3aYI3hxwZtfZj4BKv9y3it33V
ITai0o2AvJTQ056684Ve9zpoPWGBeLUnXJLkAxulDmJDJNpOICVkahL27xVi
ENMOMLQUY8lWNWLIF+vuHUPb4Yhdwd7bXsHLkXdKYQevRnJn+bwB5wxGKhlK
OaMpcmSZQ0VPuVe8VmkqfDImF8Dmsdm8k3tiezPhNDOZ1NzqmrGfPX6iS8fY
Y+KlI9myKbt12weSkKkWCziRzjeKwbvb1juS18Vr0l7VliA4WljvbWhJi8NT
F3hB2NYkoKbK2rqL4ouDSAi4jcadsK4r7btvocZOdKRfETIhdruki5J2nKyX
KCRTtbd1q62+Pp8gSKhFXOZ8v/JGkhTnN+9WQC5stHFrkFQqjVjsLTfgPTKy
y3P25cjA19Ka4475QqcixrqxMUpv+3ztCR7T74ZzZzmqNMShkeVIm/+B5lEz
ZBpJbivBWC4rn0N9byxgzzMeX0+bGvU23Yd01AfOySG5s8Mqh2qE616VpFum
Ze35loEaGnCjhXA+armVGaKedFUQKeiGfdujj1SYDENrZzFM9vcPU6OHbyJj
R5rjICfQspOa6lOsX1LiTNp4T6XCSKQ/GFz+CjI6bMukzV5Mr5nEBcuEgizd
LcUW5g6tRbdJdUesnVgBuYHIufD5/ecfquuSm2BzDN7BV7m0TqQVMU5RmFFm
SNcwnbsWLM7dPaHt0qhJa61cXeRt824XL70WOaUcFHHk7648HUbI1U6DwMIz
F8BB0N8glyvxwO0W59z2pU9nyCtSw30XP+dbTnht5Oj7KrTeDY4NjnwUeq2I
T2E26lybsWVWZgKpI3pk4FTDHtnvtF4bsYEgKL9VHbrVYucwb7a8gT2ndZIN
grAnAJpeaqoZZbVIcL9ROWV6KbzDcmXRnCLWyx1H7+WadtNJR2Bp900wxSAH
bjt7V8Y5cDzGBEVcVu3I+22Yyh0sh+n+7LavaOfqpw41A0R7JbPuSNjc8XL/
qcn5E9OtSnhOXcolpnkkgNBFh7YsFngp/rVRRT6ZK4dtJ2Hj0mit/pvlUqfi
BB9Ozxnutge8BkpQIZrqXaqImk8ycA5HFD55YFqqEWdXG0HMn/Jw62NIx029
maT7LnQq4H4ZuzH0NYbS1mKZmNKYA5pIt3at2XU2TX2nlK5LWEHN3RIvKMZ2
btLEj+fPx5Au5bpJcCBlrE7Pgz5laDk3Fz67hIqBgAn9bbsJN9Ke6y6Z+Hed
mMAN6RNMh6r/bUa12bmINSbdkexdMzIlhpEueDZpsE/R2nvlq7sLblMxuZ85
+TCn4aY68w5u0jTj4nZyk0B5PV77pM4ygLUWc8RPhITex69HeOkXdzeX4P6X
XJc/Kibw4XBHDdvbLF3trcQVyQXIe+S2h/skTb3XMm9C3KLY0lXTr9l15OTJ
QPtyqh+cbwoMKVULqU71zBbdGx9J7u2Nk7QYmmJGvobJHe3uql7rqaeh5rsd
6bP0FSJI2rtyoCfUEx8dfVL33WSROOGGw4IX7k5ViSfu7eeOG+HalEI3l5JG
5aJ8z/0TA3E6Mt8iJhmK9Y57W4CIiV+qUN9Pc4us8zVLl6amar6XKJ+oHMeN
wo6TwmC39qb7jD4RiDc4p0995NYiGVeTW8WWrkRDsgXLlc5HF/TCSRqSHdsD
WC0dKIMga/kIjFfoXMe3Z/jtpwaYTovms4ldFQGirv367zDdT+3n4fIVhGN+
VsUAoVphC6sEk+O9IODmId2wYnQTkZH9SNgSOhH6R4LC9//wZofUxfVIooL7
oG6sPvQxIGFVhMC9ENlBmJ3FdGuXjh2kv5zO3a8lm29Q+k2YxjyvPsG3mt5j
Ywx1Q0reCsy7zR4QGaHlNfsK1iRoO5Iiz2X0LvWDqZL4llqS2jeWzx0DVtrl
7vawycLUd08NGCmrpdrd/ggWFufLZgIZ+kJobs2DtLaEgW2oNTRFLwbtAIi2
Hybb7VZMx4idDnB/r2HT6OKmzrTticinGVz0tAb9/hOMWNjU3usEWroelsrb
byXczW03D9L3OGrwI3MgIqTrwOt0EKDbRI1v5ZItli0I15o6rbGXHHEhNzAw
3XGZKmtKUb7C6nZWCKaX3JGR6/9h7Nx0PjGizg19rN8ZS/3pB2fbz1hRC/h6
Ka2QORecExObSHniVdBeNN2Z48+V4pcxDE+v38R0d3l6dbprQO8im76dLJ2M
1Vn/a17qK8lSpxl9pwkJZjF5fj0p68WEeuP/+WwKFzXPfkmynVEqp4YDiokn
Bso//w8GkFy0BzIAAA==

-->

</rfc>
